I just gave the new patch a shot and I'm still experiencing a problem
I've been seeing for some time. I get a segmentation fault in
isight_load_firmware but for what reason I'm unsure. I'm attaching the
dump I find in dmesg. I'd much appreciate any help anyone can give me.
Firmware is where it should be. I've tried with both the version from my
OSX drive and the version in the all-in-one bundle with the same results.
Sean Burke
BUG: unable to handle kernel NULL pointer dereference at virtual address
00000002
printing eip:
f8bddbba
*pde = 00000000
Oops: 0000 [#1]
PREEMPT SMP
Modules linked in: cryptomgr crypto_algapi uvcvideo snd_pcm_oss
snd_mixer_oss snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device
hci_usb wlan_scan_sta ath_rate_sample(F) ath_pci(F) wlan ath_hal(P) sky2
usbhid appletouch evdev snd_hda_intel snd_pcm snd_timer snd soundcore
snd_page_alloc
CPU: 0
EIP: 0060:[<f8bddbba>] Tainted: PF VLI
EFLAGS: 00210282 (2.6.23-gentoo-r3-mactel #1)
EIP is at isight_load_firmware+0x1ba/0x570 [uvcvideo]
eax: eaecbcdc ebx: f7f79200 ecx: c189f4c0 edx: fffffffe
esi: eaecbcdc edi: eaecbccc ebp: f78c4400 esp: eaecbc7c
ds: 007b es: 007b fs: 00d8 gs: 0033 ss: 0068
Process modprobe (pid: 6837, ti=eaeca000 task=f78b3550 task.ti=eaeca000)
Stack: 00000001 c1563ba0 c015535c 00000002 00000044 eb1dc000 eaecbcb8
ea820000
00012ab0 c04bcb00 c04bca40 00000002 00000000 c17d3a14 c04bd150
00000000
00000000 00000000 00000000 00000000 c1550400 00000000 c012165f
00012ab0
Call Trace:
[<c015535c>] get_page_from_freelist+0x2ac/0x3a0
[<c012165f>] enqueue_entity+0xbf/0x230
[<f8bd6dbb>] uvc_delete+0x24b/0x1e50 [uvcvideo]
[<c0125c79>] check_preempt_curr_fair+0x59/0x90
[<c0274caa>] idr_get_empty_slot+0xea/0x270
[<c0274eb7>] ida_get_new_above+0x87/0x180
[<c0182e5e>] find_inode+0x3e/0x70
[<c01ac290>] sysfs_ilookup_test+0x0/0x10
[<c0182fa6>] ifind+0x46/0xa0
[<c0182c75>] iput+0x35/0x70
[<c01ac8c4>] sysfs_addrm_finish+0x34/0x200
[<c01adb36>] sysfs_create_link+0x96/0x170
[<c0339517>] usb_match_one_id+0x27/0xc0
[<c033a3a5>] usb_probe_interface+0x75/0xd0
[<c02e82ce>] driver_probe_device+0x8e/0x190
[<c03eb97d>] klist_next+0x5d/0xa0
[<c02e8510>] __driver_attach+0x80/0x90
[<c02e768a>] bus_for_each_dev+0x3a/0x60
[<c02e8136>] driver_attach+0x16/0x20
[<c02e8490>] __driver_attach+0x0/0x90
[<c02e7a6b>] bus_add_driver+0x8b/0x1b0
[<c033a330>] usb_probe_interface+0x0/0xd0
[<c0339e25>] usb_register_driver+0x95/0x110
[<f8a4106f>] init_module+0x6f/0x86 [uvcvideo]
[<c014858f>] sys_init_module+0x15f/0x18d0
[<c01554a7>] __alloc_pages+0x57/0x2f0
[<f8bc5000>] crypto_remove_final+0x0/0x50 [crypto_algapi]
[<c028f55d>] tty_write+0x1bd/0x1d0
[<c010431e>] sysenter_past_esp+0x5f/0x85
=======================
Code: 8b 44 24 20 89 44 24 5c b8 6f 01 be f8 e8 3f a6 68 c7 89 c2 89 44
24 60 85 d2 b8 00 02 00 00 89 44 24 64 74 30 8d 74 24 60 89 f0 <ff> 52
04 89 f0 8b 5c 24 60 8d 54 24 50 8b 4c 24 20 ff 53 08 89
EIP: [<f8bddbba>] isight_load_firmware+0x1ba/0x570 [uvcvideo] SS:ESP
0068:eaecbc7c
_______________________________________________
Linux-uvc-devel mailing list
[email protected]
https://lists.berlios.de/mailman/listinfo/linux-uvc-devel